e:\Project\mm\Wininet\Attack\MiniAsp3\Release\MiniAsp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
36e5db86a38dccf66fe87b9e043eb944_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
36e5db86a38dccf66fe87b9e043eb944_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
36e5db86a38dccf66fe87b9e043eb944_JaffaCakes118
-
Size
32KB
-
MD5
36e5db86a38dccf66fe87b9e043eb944
-
SHA1
9ac8927283396b362935ca3141711f26b70f7827
-
SHA256
c49b7a6f95dd61e8f8d2fe017ed22701e1277595a5e4a91625be22d93a5dec5c
-
SHA512
02f85b33ca7a89fa56a0a5437640b79a128bd5c9a68383521f76d69660a828f8be7e505d5c070fd6d0bf187beae666567b2cd3e548eb06dada5bf78f5f006da4
-
SSDEEP
768:2nia7EVNAmmfPEsu2j90SYG8MgNDycXLUA2DXdhItYVvOcgAmZQ:2iaDfhuwWSYGbc4JAYhO5ZQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36e5db86a38dccf66fe87b9e043eb944_JaffaCakes118
Files
-
36e5db86a38dccf66fe87b9e043eb944_JaffaCakes118.exe windows:5 windows x86 arch:x86
1104a48d6c9a5cd24434737bb433b8d1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcr90
_crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_unlock
__set_app_type
_lock
_onexit
_decode_pointer
_invoke_watson
_controlfp_s
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
strstr
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_except_handler4_common
strncmp
strncpy
atol
_CxxThrowException
__CxxFrameHandler3
realloc
free
_splitpath
strchr
_localtime64
srand
rand
_beginthread
memcpy
malloc
sscanf
atof
_localtime64_s
asctime_s
atoi
sprintf
??3@YAXPAX@Z
memset
printf
??2@YAPAXI@Z
_time64
__dllonexit
wininet
InternetConnectA
InternetOpenA
InternetReadFile
HttpQueryInfoA
HttpSendRequestExA
InternetWriteFile
HttpEndRequestA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetSetCookieA
HttpSendRequestA
InternetCloseHandle
InternetAttemptConnect
kernel32
GetCurrentProcess
GetLastError
GetModuleHandleA
GetProcAddress
GetModuleFileNameA
GetCurrentDirectoryA
SetFilePointer
WideCharToMultiByte
CreateFileA
GetFileSize
WriteFile
OpenProcess
SetCurrentDirectoryA
GetTickCount
CreatePipe
GetStartupInfoA
CreateProcessA
CloseHandle
WaitForSingleObject
ReadFile
PeekNamedPipe
Sleep
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
HeapFree
HeapAlloc
GetProcessHeap
InterlockedExchange
InterlockedCompareExchange
UnhandledExceptionFilter
WinExec
SetUnhandledExceptionFilter
user32
DispatchMessageA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
UpdateWindow
ShowWindow
CreateWindowExA
PostQuitMessage
EndPaint
BeginPaint
DestroyWindow
DefWindowProcA
RegisterClassExA
LoadCursorA
LoadIconA
advapi32
LookupAccountSidA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
GetTokenInformation
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ